tix / defcon31Links
☆35Updated 2 years ago
Alternatives and similar repositories for defcon31
Users that are interested in defcon31 are comparing it to the libraries listed below
Sorting:
- Tuoni☆202Updated 3 weeks ago
- Infrastructure Automation☆358Updated last year
- Retired TrustedSec Capabilities☆248Updated last year
- Weaponized Browser-in-the-Middle (BitM) for Penetration Testers☆582Updated 2 weeks ago
- a tool to help operate in EDRs' blind spots☆771Updated last year
- ☆154Updated 9 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆194Updated 10 months ago
- Script collection to bypass Network Access Control (NAC, 802.1x)☆332Updated last week
- Your template-based BloodHound terminal companion tool☆434Updated 4 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- ☆124Updated last year
- User Enumeration of Microsoft Teams users via API☆181Updated last year
- PXEThief is a set of tooling that can extract passwords from the Operating System Deployment functionality in Microsoft Endpoint Configur…☆405Updated last year
- A tool to query for the existence of pre-windows 2000 computer objects.☆360Updated this week
- Completely Risky Active-Directory Simulation Hub☆102Updated 2 years ago
- ☆302Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆100Updated 3 years ago
- ☆105Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated last month
- Malware As A Service☆135Updated last year
- Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc.☆494Updated 2 years ago
- ☆229Updated 6 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆348Updated last year
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆217Updated 2 months ago
- WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.☆166Updated 8 months ago
- A tool for pointesters to find candies in SharePoint☆272Updated 3 years ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆279Updated 2 years ago
- Invoke-ArgFuscator is an open-source, cross-platform PowerShell module that helps generate obfuscated command-lines for common system-nat…☆257Updated 8 months ago
- ☆163Updated 6 months ago
- Bypassing Kerberoast Detections with Modified KDC Options and Encryption Types☆408Updated 9 months ago